FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade. https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5w4j-mrrh-jjrm
Created freerdp tracking bugs for this issue: Affects: fedora-35 [bug 2143651] Affects: fedora-36 [bug 2143652] Affects: fedora-37 [bug 2143653] Created freerdp1.2 tracking bugs for this issue: Affects: epel-7 [bug 2143650]
Upstream Commit: https://github.com/FreeRDP/FreeRDP/commit/e865c24efc40ebc52e75979c94cdd4ee2c1495b0
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2326 https://access.redhat.com/errata/RHSA-2023:2326
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2851 https://access.redhat.com/errata/RHSA-2023:2851
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-39316